CEDRIC - cedric RSS feedhttp://cedric.cnam.fr/rss/cedric.xml
frFri, 16 Mar 2018 21:32:51 +0100https://cedric.cnam.fr/index.php/default/event/view?id=279https://cedric.cnam.fr/index.php/default/event/view?id=279
#MSDMA - Mobile e-Book for BITEC Learner & K-12 Data Analysis In the Big Data era& #160;
Le prochain s& #233;minaire de Statistique appliqu& #233;e du CNAM& #160;se tiendra& #160;le& #160; vendredi 30 mars de 11h & #224; 12h en salle 35.1.53 (2 rue Cont& #233;, entr& #233;e 35, 1er & #233;tage).
Nous accueillerons Taerim Lee (Korea National Open University) pour une conf& #233;rence intitul& #233;e :
Mobile e-Book for BITEC Learner & #38; K-12 Data Analysis In the Big Data era
Summary : This project promotes the implementation of mobile e-Book initiative in Bioinformatics Training & #38; Education Center (BITEC) supported from Korean Ministry of Health and Welfare and for training K-12 data analysis in the big data era. Each were 5 years projects co-work together Seoul National University Medical College and this is the last year of this project and we build up KNOU OER LMS system for nationwide medical doctors and data scientist too. The leaders of this mobile e-Book initiative for Life Long Learning are KNOU, only one National Open University in Korea, SNU Medical College renowned university in Korea & #38; KSS. Despite that mobile delivery of courses in higher education graduate level is yet rare, KNOU with the 45 years of long distance education experience and know-hows has expanded the scope of mobile learning for training medical doctors with e-Book and multimedia lecture available using their cellular phones.
Using ICT the world becoming closely connected and mobile e-Stat data analysis system will be an easy accessible educational media for training data analysis for K-12 in the era of big data, with an estimated 95% of the global population living in an area covered by at least a basic mobile cellular network. Global learner have access to the internet and it is expected to continue to rise as more and more open and distance learners, LLL learners come online. E-Stat free version translated in Japanese, Chinese and English too. The rapid growth in broadband access and usage, driven by mobile broadband technologies, has fostered the development of a mobile e-book for training open & #38; distance connected learner.
The high penetration rates of mobile phone subscriptions and the rapid growing of handheld users transform higher education and K-12 education through digitally supported learning & #38; teaching for learner. The BITEC m-Learning initiative focuses on introducing Bioinformatics and Data Analysis using handheld devices to be made easily accessible for medical doctors on the field and open up ubiquitous learning environment. Lesson learned from this initiative is that the mobile e-Book could be the most affordable, accessible and flexible educational media. Consequently, more accessible tertiary education will meet the demands of population that did not have the time and place for such learning.
Keywords: m-Learning, Distance learning, u-Learning, BITEC
Fri, 16 Mar 2018 21:32:51 +0100MSDMAEventhttps://cedric.cnam.fr/index.php/labo/membre/kedad--sshttps://cedric.cnam.fr/index.php/labo/membre/kedad--ss
#OC - Safia Kedad-SidhoumaTue, 13 Mar 2018 11:48:55 +0100OCJobhttps://cedric.cnam.fr/index.php/publis/article/view?id=4240https://cedric.cnam.fr/index.php/publis/article/view?id=4240
#Isid - UMLtoNoSQL: Automatic Transformation of Conceptual Schema to NoSQL DatabasesNoSQL data stores are becoming widely used to handle Big Data;
these systems operate on schema-less data model enabling users to incorporate
new data into their applications without using a predefined schema. But, there is
still a need for a conceptual model to define how data will be structured in the
database. In this paper, we show how to store Big Data described by a
conceptual model within NoSQL systems. For this, we use the Model Driven
Architecture (MDA) that provides a framework for models automatic
transformation. Starting from a conceptual model describing a set of complex
objects, we propose transformation rules formalized with QVT to generate
NoSQL physical models. To ensure efficient automatic transformation and to
limit the impacts related to technical aspects of NoSQL systems, we propose a
generic logical model that is compatible with the three types of NoSQL systems
(column, document and graph). We provide experiments of our approach using
a case study taken from the health care domain.Mon, 12 Mar 2018 12:14:32 +0100IsidPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4239https://cedric.cnam.fr/index.php/publis/article/view?id=4239
#Laetitia - Erasure correction based CSMA/CAIt is well known that the performance of carrier sense multiple access with collision
avoidance (CSMA/CA) is poor when the number of users increases, due to collisions.
In this paper, we consider a modified version of CSMA/CA based on erasure codes at the
packet level, which significantly reduces the complexity of the decoding and does not require
any change in the underlying physical layer. In order to improve the performance, we
use non-binary maximum distance separable (MDS) codes. We give analytical derivation
of the global goodput and show that there is a trade-off between the code parameters and
the length of the contention window in order to maximize the global goodput for a given
number of users.Thu, 08 Mar 2018 17:36:41 +0100LaetitiaPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4238https://cedric.cnam.fr/index.php/publis/article/view?id=4238
#Laetitia - Exploiting Signal Space Diversity in OFDM with Grouped Subcarriers: Going Beyond Subcarrier Index ModulationWe propose a unified approach for orthogonal
frequency-division multiplexing (OFDM) with grouped subcarriers
which encompasses previous schemes such as subcarrier-index
modulation (SIM) and grouped linear constellation-precoding
(GLCP) as particular cases. To exploit signal space diversity
(SSD), we treat the n subcarriers within a group as 2n real
resources. Interleaving at the real component level is used
to break the correlation between adjacent subcarriers. Error
performance analysis then reveals that a 2n-dimensional real
signal constellation (codebook) should be designed according
to the SSD criterion and the multiplicity-to-product distance
ratio criterion. Under certain constraints, the maximum diversity
gain of 2n can be achieved by proper design. We design new
codebooks based on real lattices and show through both computer
simulations and analysis that a superior error performance can
be achieved.Thu, 08 Mar 2018 17:04:36 +0100LaetitiaPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4237https://cedric.cnam.fr/index.php/publis/article/view?id=4237
#Mim - Performance Evaluations in Optical and Wireless Networks for CONDOR projectWireless and optical networks are widely used nowadays. These networks offer a high throughput thanks to their optical link and allow the development of multiuser applications. Because the network performance is an important issue to provide services to a great number of users while assuring users’ quality of service requirements, CONDOR (CONtribution a la Diffusion de l’histOiRe du traitement de l’information a l’aide du réseau de demain) project aims to evaluate the wireless and optical networks’ performances in terms of link quality, throughput, jitter and delay. Our results show that a high throughput in optical and wireless networks supports a big load through the launched mobile applications while P2P wireless network connections upset some video applications.Thu, 08 Mar 2018 15:30:48 +0100MimPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4236https://cedric.cnam.fr/index.php/publis/article/view?id=4236
#Laetitia - Procédé et dispositif de multiplexage spatial de liaisons dans un réseau de communicationProcédé et dispositif de multiplexage spatial de liaisons dans un réseau de communicationThu, 08 Mar 2018 14:36:36 +0100LaetitiaPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4235https://cedric.cnam.fr/index.php/publis/article/view?id=4235
#Laetitia - Enhanced Widely Linear Filtering to Make Quasi-Rectilinear Signals almost Equivalent to Rectilinear Ones for SAIC/MAICWidely linear (WL) receivers have the capability to
perform single antenna interference cancellation (SAIC) of one
rectilinear (R) or quasi-rectilinear (QR) co-channel interference
(CCI), a function which is operational in global system for mobile
communications (GSM) handsets in particular. Moreover, SAIC
technology for QR signals is still required for voice services over
adaptive multiuser channels on one slot (VAMOS) standard, a recent
evolution of both GSM and enhanced data rates for GSM
evolution (EDGE) standards, to mitigate legacy GSM CCI in particular.
It is also required for filter bank multicarrier offset quadrature
amplitude modulation (FBMC-OQAM) networks, which are
candidate for 5G mobile networks, to mitigate intercarrier interference
at reception for frequency selective propagation channels
in particular. In this context, the purpose of this paper is twofold.
The first one is to get more insights into the existing SAIC technology,
and its extension to multiple antenna called multiple antenna
interference cancellation (MAIC), by showing analytically that,
contrary to what is accepted as true in the literature, SAIC/MAIC
implemented from standard WL filtering may be less efficient for
QR signals than for R ones. From this result, the second purpose of
the paper is to propose and to analyze, forQRsignals and frequency
selective fading channels, an SAIC/MAIC enhancement based on
a three-input WL frequency shift receiver, making QR signals always
almost equivalent to R ones for WL filtering in the presence
of CCI. The results of the paper, completely new, may contribute
to develop elsewhere new powerful WL receivers for QR signals
and for both VAMOS and FBMC-OQAM networks in particularThu, 08 Mar 2018 14:30:41 +0100LaetitiaPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4234https://cedric.cnam.fr/index.php/publis/article/view?id=4234
#OC - Quantifying extinction probabilities of endangered species for phylogenetic conservation prioritization may not be as sensitive as might be fearedIn this study we are concerned with the general problem of choosing from a set of endangered species T a subset S of k species to protect as a priority. Here, the interest to protect the species of S is assessed by the resulting expected phylogenetic diversity (ePD) of the set T, a widely used criterion for measuring the expected amount of evolutionary history associated with T. We consider that the survival of the protected species is assured and, on the contrary, that there is a risk of extinction for the unprotected species. The problem is easy to solve by a greedy type method if the extinction probabilities of the unprotected species are known but these probabilities are generally not easy to quantify. We show in this note that the choice of the precise values attributed to the extinction probabilities—provided it respects the rank of imperilment of each species—is not as decisive as might be feared for the considered problem. The values of these probabilities have a clear impact on the selection of the species to be protected but a little impact on the resulting ePD. More precisely, if T 1 and T 2 are the two optimal subsets of species corresponding to two scenarios (two different sets of probabilities) the ePDs of T 1 and T 2, calculated with the probabilities of the first scenario—or with the probabilities of the second scenario—are not very different.Thu, 08 Mar 2018 10:14:55 +0100OCPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4233https://cedric.cnam.fr/index.php/publis/article/view?id=4233
#Isid - Roundtrip engineering of NoSQL databasesIn this article we present a framework describing a roundtrip engineering process for NoSQLdatabase systems. This framework, based on the Model Driven Engineering approach, is composed of aknowledge base guiding the roundtrip process. Starting from a roundtrip generic scenario, we proposeseveral roundtrip scenarios combining forward and reverse engineering processes. We illustrate ourapproach with an example related to a property graph database. The illustrative scenario consists ofsuccessive steps of model enrichment combined with forward and reverse engineering processes. Futureresearch will consist in designing and implementing the main components of the knowledge base.Wed, 07 Mar 2018 17:12:21 +0100IsidPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4232https://cedric.cnam.fr/index.php/publis/article/view?id=4232
#Isid - A Four V's Design Approach of NoSQL Graph DatabasesBig Data has been described as a four-dimensional model with Volume, Variety, Velocity, and Veracity. In this paper we discuss the potential of a model-driven approach (MDA) to tackle design issues of Big Data taking into account the effect of the four dimensions. Our approach considers NoSQL graph databases. The approach is applied to the case of Neo4j database. Our main contribution is an MDA methodology that enables to tackle the four V’s dimensions described above. It consists of two major steps: (i) a forward engineering approach based on MDA as well as a set of transformations rules enabling the development of a conceptual, logical, and physical model for big data encompassing the four V’s, (ii) a volume-guided approach supporting the generation of test bases dedicated to performance evaluation. We present an illustrative scenario of our forward engineering approach.Wed, 07 Mar 2018 16:55:56 +0100IsidPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4231https://cedric.cnam.fr/index.php/publis/article/view?id=4231
#Isid - A Method for Emerging Technology Evaluation. Application to Blockchain and Smart Data DiscoveryEmerging technologies represent a major innovation that offers significant advances to both private and public organizations. Examples of these technologies are the “Blockchain technology” which combines cryptographic mechanisms and peer-to-peer (P2P) architecture and “Smart Data Discovery” combining artificial intelligence and analytics. The importance of these emerging technologies requires the use of evalua-tion methods in order to understand their contribution and the associat-ed risks. The objective of this article is to propose a method supporting the evaluation of emerging technologies. A guidance approach is pro-posed. It is based on the recognition that emerging technologies are complex systems. Our approach combines three conceptual frame-works: the underlying theory of complex information systems, systems theory, and the ISO 25001 standard devoted to software quality. We propose a multi-criteria hierarchy which serves as the basis for the eval-uation. To illustrate this approach, we apply it to the particular cases of “Blockchain” technology and “Smart Data Discovery”.Wed, 07 Mar 2018 16:49:06 +0100IsidPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4230https://cedric.cnam.fr/index.php/publis/article/view?id=4230
#Isid - Model driven reverse engineering of NoSQL property graph databases: The case of Neo4jAbstract:
Most NoSQL databases are schemaless. Although they offer some flexibility, they do not have any knowledge of the database schema, losing the benefits provided by these schemas. It is generally accepted that data modelling can have an impact on performance, consistency, usability, and maintainability. We argue that NoSQL databases need data models that ensure the proper storage and the relevant querying of the data. This paper seeks to present and illustrate an MDA-based approach, allowing us to achieve a reverse engineering of NoSQL property graph databases into an Extended Entity-Relationship schema. The approach is applied to the case of Neo4j graph database. We present an illustrative scenario and evaluate the reverse engineering approach.Wed, 07 Mar 2018 16:44:35 +0100IsidPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4229https://cedric.cnam.fr/index.php/publis/article/view?id=4229
#Isid - Using the AMAN-DA method to generate security requirements: a case study in the maritime domainSecurity requirements are known to be “the most difficult of requirements types” and potentially the ones causing the greatest risk if they are not correct. One approach to requirements elicitation is based on the reuse of explicit knowledge. AMAN-DA is a requirement elicitation method that reuses encapsulated knowledge in security and domain ontologies to produce security requirements specifications. The main research question addressed in this paper is to what extent is AMAN-DA able to generate domain-specific security requirements? Following a well-documented process, a case study related to the maritime domain was undertaken with the goal to demonstrate the utility and effectiveness of AMAN-DA for the elicitation and analysis of domain-specific security requirements. The usefulness of the method was also evaluated with a group of 12 experts. The paper demonstrates the elicitation of domain-specific security requirements by presenting the AMAN-DA method and its application. It describes the evaluation and reports some significant results and their implications for practice and future research, especially for the field of knowledge reuse in requirements engineering.Wed, 07 Mar 2018 16:37:44 +0100IsidPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4228https://cedric.cnam.fr/index.php/publis/article/view?id=4228
#Isid - Modélisation Conceptuelle des Bases Prosopographiques -
Représentation de l’Information IncertaineLa prosopographie est une méthode permettant d’étudier un groupe social en comparant
les itinéraires biographiques particuliers de chacun de ses membres. Il s’agit d’approcher un
groupe, d’en comprendre les fonctionnements, sans en négliger les trajectoires singulières. Elle
repose sur une enquête précise, documentée, de chaque individu de la population déterminée.
En histoire, c’est grâce a une méthodologie et une érudition pointue que l’on collecte l’ensemble
des traces qui vont constituer la fiche de chaque personne. Toutes les périodes historiques
utilisent cette méthode d’investigation. Si la méthode est ancienne, le mot "prosopographia"
apparaît au XVIe siècle, l’analyse quantitative et l’ordinateur ont profondément transformé
sa méthodologie au XXe siecle. De nombreux périodiques se sont intéressés a cet aspect
en proposant des articles sur ce thème. Plusieurs historiens ont même proposé des développements
de logiciels dédiés. On retiendra surtout l’apport des bases de données qui ont permis,
par exemple, d’aborder très concrètement le "sourçage" de l’information. Sur les fiches papier,
il est difficile d’indicer chaque fait constituant la carrière d’une personne avec le document qui
a permis de l’établir. De la même façon, il n’est pas simple de gérer une information contradictoire.
Or il est, en effet, possible que deux documents différents apportent des informations
contradictoires sur un individu.
Dans cet article nous proposons un modèle conceptuel permettant de décrire de manière
générale et enrichie l’information contenue dans une base de données prosopographique.Nous
étudions ensuite comment ce modèle peut être instancié avec les bases de données du projet
PASE (Bradley et Short, 2005) et STUDIUM (Genet et al., 2016).Wed, 07 Mar 2018 15:32:13 +0100IsidPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4227https://cedric.cnam.fr/index.php/publis/article/view?id=4227
#Laetitia - On frequency domain equalization for FBMC-PAM communication systems Among the filter bank multicarrier techniques for efficient transmission in communication systems, the recently proposed FBMC-PAM transceiver exhibits many advantages in comparison with the OFDM system; in particular, it does not require a cyclic prefix and, in the asynchronous multiuser context, it provides a high level of separation anmong users .However, a performance loss is encountered when operating in hostile multipath channel if the latency of the overall transceiver and the receuiver complexity are limited.The equalizer here proposed is aimed at reducing the performance gap between the two systems without resorting to an increase of latency and complexity.Its performance is assessed by simulations.The obtained results show that it exhibits a performance advance in comparison with the standard FBMC-PAM equalizer, significantly reducing the gap with the standard OFDM system when a low rate transceiver contellation is used. Moreover, a reduced complexity version of the equalizer is derived and analyzed.Wed, 07 Mar 2018 10:57:27 +0100LaetitiaPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4226https://cedric.cnam.fr/index.php/publis/article/view?id=4226
#Laetitia - Procédé et dispositif d'émission,procédé et dispositif de réceptionTechnique de transmission multiporteuse de type "filter bank multicarrier" (FBMC), utilisant la modulation "quadrature amplitude modulation" (QAM). L'approche est basée sur la transformation dite "lapped transform", alors que la technique courante "orthogonal frequency division multiplexing (OFDM) est basée sur la transformation de Fourier discrète (DFT). Les gains sont principalement une meilleure localisation spectrale et l'absence de temps de garde entre les symboles, ce qui conduit a une meilleure efficacité spectrale des systèmes de transmission.Wed, 07 Mar 2018 10:24:10 +0100LaetitiaPaperhttps://cedric.cnam.fr/index.php/default/event/view?id=278https://cedric.cnam.fr/index.php/default/event/view?id=278
#MSDMA - Regularized Generalized Canonical Correlation Analysis as general framework for Structured data analysis.& #160;
Bonjour,
& #160;
Le prochain s& #233;minaire de Statistique appliqu& #233;e du CNAM& #160;se tiendra& #160;le& #160; vendredi 16 mars de 11h & #224; 12h
en salle 35.1.53 (2 rue Cont& #233;, entr& #233;e 35, 1er & #233;tage).
Nous accueillerons Arthur Tenenhaus, pour une conf& #233;rence intitul& #233;e:
Regularized Generalized Canonical Correlation Analysis as general framework for& #160; Structured data analysis.
Summary : The challenges related to the use of massive amounts of data include identifying the relevant variables, reducing dimensionality, summarizing information in a comprehensible way and displaying it for interpretation purposes. Often, these data are intrinsically structured in blocks of variables, in groups of individuals or in tensor. Classical statistical tools cannot be applied without altering their structure leading to the risk of information loss. The need to analyze the data by taking into account their natural structure appears to be essential but requires the development of new statistical techniques. In that context a general framework for structured data analysis based on Regularized Generalized Canonical Correlation Analysis (RGCCA) will be presented.Wed, 07 Mar 2018 09:50:56 +0100MSDMAEventhttps://cedric.cnam.fr/index.php/publis/article/view?id=4225https://cedric.cnam.fr/index.php/publis/article/view?id=4225
#SYS - TesttestWed, 07 Mar 2018 08:47:34 +0100SYSPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4224https://cedric.cnam.fr/index.php/publis/article/view?id=4224
#SYS - Experimental Evaluation of Fault-Tolerant Mechanisms over Imote2 PlatformExperimental Evaluation of Fault-Tolerant Mechanisms over Imote2 PlatformTue, 06 Mar 2018 22:45:49 +0100SYSPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4223https://cedric.cnam.fr/index.php/publis/article/view?id=4223
#SYS - Experimental Evaluation of Fault-Tolerant Mechanisms over Imote2 PlatformExperimental Evaluation of Fault-Tolerant Mechanisms over Imote2 Platform
\item M. Bouatit, \textbf {S. Boumerdassi} and A. Djama. {\em}. Proceedings of. CCNC. January 2018. Las Vegas, USA.Tue, 06 Mar 2018 22:37:58 +0100SYSPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4222https://cedric.cnam.fr/index.php/publis/article/view?id=4222
#SYS - Experimental Evaluation of Fault-Tolerant Mechanisms over Imote2 Platform Experimental Evaluation of Fault-Tolerant Mechanisms over Imote2 PlatformTue, 06 Mar 2018 22:32:26 +0100SYSPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4221https://cedric.cnam.fr/index.php/publis/article/view?id=4221
#SYS - Adapted Bin Packing Algorithm for Virtuals Machines Placement into Datacenters Adapted Bin Packing Algorithm for Virtuals Machines Placement into Datacenters Tue, 06 Mar 2018 22:20:22 +0100SYSPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4220https://cedric.cnam.fr/index.php/publis/article/view?id=4220
#SYS - Predicting resource requirements of the servers into cloud datacenters using neural networksPredicting resource requirements of the servers into cloud datacenters using neural networksTue, 06 Mar 2018 22:14:54 +0100SYSPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4219https://cedric.cnam.fr/index.php/publis/article/view?id=4219
#SYS - Data Analysis of a Google Data CenterData Analysis of a Google Data CenterTue, 06 Mar 2018 21:56:30 +0100SYSPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4218https://cedric.cnam.fr/index.php/publis/article/view?id=4218
#SYS - A Generic Virtual Machine Approach for Programming Microcontrollers: the OMicroB Project In this paper, we present an original approach of programming microcontrollers. This approach, which stem from our first results with the OCaPIC project of running OCaml on PIC microcon-trollers, consists of a generic virtual machine which goal is portability as well as memory saving. We argue that such an approach can lead to safer programs, both by using a high level programming language and by being able to use software tools dedicated to code analysis thanks to code factorization. Our generic virtual machine, called OMicroB, is foreseen to run both simple hobbyist and entertainment programs as well as critical concurrent applications in embedded systems.Fri, 02 Mar 2018 17:43:05 +0100SYSPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4217https://cedric.cnam.fr/index.php/publis/article/view?id=4217
#Mim - Thomas Westin, JaEun Jemma Ku, Jérôme Dupire, Ian Hamilton.Fri, 02 Mar 2018 16:30:20 +0100MimPaperhttps://cedric.cnam.fr/index.php/publis/article/view?id=4216https://cedric.cnam.fr/index.php/publis/article/view?id=4216
#Isid - Un partitionnement d'arêtes a base de blocs pour les algorithmes de marches aléatoires dans les grands graphes sociaux.Des résultats récents (Bourse et al., 2014; Gonzalez et al., 2012; Xin et al., 2013)
montrent que le partitionnement des arêtes (vertex-cut) s’avère être plus efficace que le
partitionnement des sommets (edge-cut) traditionnellement utilisé pour les calculs sur des
graphes réels comme les graphes des réseaux sociaux. Compte tenu de la distribution de type
« power-law » de la plupart des graphes, le partitionnement des arêtes (vertex-cut) permet
d’éviter des calculs asymétriques. Par conséquent, plusieurs systèmes de calcul de graphe
basés sur cette approche ont été proposés, tels que PowerGraph (GraphLab2) (Gonzalez et al.,
2012) et GraphX (Xin et al., 2013). Leurs stratégies de partitionnement sont génériques et ne
dépendent pas des algorithmes utilisés pour effectuer les différents calculs. Nous proposons
dans cet article une nouvelle stratégie de partitionnement de graphe (de ses arêtes) optimisant
l’exécution des algorithmes basés sur les marches aléatoires qui prennent en compte les
propriétés topologiques des graphes. Notre stratégie est basée sur la construction de blocs
qui modélisent des communautés locales. Notre approche de partitionnement en blocs fournit
une distribution équilibrée des arêtes sur les noeuds de calcul et permet de la maintenir
dynamiquement. Les coûts de communication pour les calculs utilisant des marches aléatoires
sont réduits de manière significative par rapport aux approches existantes.Fri, 02 Mar 2018 10:51:37 +0100IsidPaperhttps://cedric.cnam.fr/index.php/labo/membre/lecacheuxyhttps://cedric.cnam.fr/index.php/labo/membre/lecacheuxy
#Vertigo - Yannick LE CACHEUXaThu, 01 Mar 2018 16:47:57 +0100VertigoJobhttps://cedric.cnam.fr/index.php/publis/article/view?id=4213https://cedric.cnam.fr/index.php/publis/article/view?id=4213
#Isid - An Improved Non-Personalized Combined-Heuristic Strategy for Collaborative Filtering Recommender Systems.Wed, 28 Feb 2018 17:26:24 +0100IsidPaper